戦術「Initial Access」に関連する攻撃手法(Technique)の一覧です。
| Technique ID | Name | Description |
|---|---|---|
| T1189 | Drive-by Compromise | Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. Multiple w… |
| T1190 | Exploit Public-Facing Application | Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The we… |
| T1192 | Spearphishing Link | Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in t… |
| T1193 | Spearphishing Attachment | Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms … |
| T1194 | Spearphishing via Service | Spearphishing via service is a specific variant of spearphishing. It is different from other forms of spearphishing in t… |
| T1195 | Supply Chain Compromise | Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose … |
| T1195.001 | Compromise Software Dependencies and Development Tools | Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purp… |
| T1195.002 | Compromise Software Supply Chain | Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system c… |
| T1195.003 | Compromise Hardware Supply Chain | Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data … |
| T1199 | Trusted Relationship | Adversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted t… |
| T1200 | Hardware Additions | Adversaries may physically introduce computer accessories, networking hardware, or other computing devices into a system… |
| T1566 | Phishing | Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delive… |
| T1566.001 | Spearphishing Attachment | Adversaries may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Sp… |
| T1566.002 | Spearphishing Link | Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphi… |
| T1566.003 | Spearphishing via Service | Adversaries may send spearphishing messages via third-party services in an attempt to gain access to victim systems. Spe… |
| T1566.004 | Spearphishing Voice | Adversaries may use voice communications to ultimately gain access to victim systems. Spearphishing voice is a specific … |
| T1659 | Content Injection | Adversaries may gain access and continuously communicate with victims by injecting malicious content into systems throug… |
| T1669 | Wi-Fi Networks | Adversaries may gain initial access to target systems by connecting to wireless networks. They may accomplish this by ex… |